Contact Us

|

Careers

|

Change Locale
close

Posts by Stephen Perciballi

Featured Article
From the experts | August 29, 2013 by Stephen Perciballi
Depending on your organization, BYOD means a lot of different things. BYOD can be a welcome change (employee retention, talent acquisition, employee satisfaction, productivity enhancement, lower IT costs, and potentially customer satisfaction) or a challenge (security, access/restriction of data, lost devices, etc). Regardless, the first step is knowing the who’s, what’s and where’s of your […]
Featured Article
Client Computing | August 7, 2013 by Stephen Perciballi
One of the perks working closely with the Blackberry team is getting our hands on new devices. I’ve been using the Z10 since November and have been really enjoying it. A review and video can be found here. Many of the people I’ve been working with have been anxiously awaiting the latest BlackBerry with full, […]
Featured Article
Related Posts To SIEM or Not to SIEM Security Information and Event Management (SIEM) solutions are a combination of SIM (security information management) and SEM (security event manager). Whatever the acron… Silo Wars: The Reality of the Modern Data Center “Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before […]
Featured Article
Client Computing | January 29, 2013 by Stephen Perciballi
The new BlackBerry 10 has arrived! Because Softchoice is part of the BlackBerry Technical Preview Program, we had exclusive access to the technology (handset and server software) before its official release, and I was able to spend a couple of weeks using the device. During that time, I had a chance to form some pretty strong […]
Featured Article
Client Computing | January 28, 2013 by Stephen Perciballi
Considering BlackBerry out of the game is like saying you won’t drink water out of your tap now knowing that Coke exists. If you are interested in securely managing data on your smartphones and tablets you should at least look at Blackberry Enterprise Service 10 (BES 10) and BlackBerry 10 (BB 10). While the competition is definitely popular, there […]
Featured Article
From the experts | September 6, 2012 by Stephen Perciballi
While it’s true almost everyone is gung-ho about the benefits of virtualization these days, many organizations end up missing the boat on maximizing its greatest benefits – increased server utilization and consolidated workloads, lower energy costs, increased flexibility and easier system management.  Why? Maybe because they view virtualization as a magic bullet to solving all […]
Featured Article
Lots of organizations are deploying Security Information and Event Management (SIEM) systems either to do their due diligence or because it’s part of a regulatory requirement. One of the misconceptions that typically is derived from marketing material is that you plug it in, turn it on, and voila, instant security. This couldn’t be further from […]
Featured Article
So many names. It always reminds me of the line from The Devil’s Advocate when Pacino says “Oh, I have so many names.” Security Information Management, Security Information and Event Management, SIM, SIEM, Log Management, Log Aggregation. If you really like to use buzz words you could call this Big Data for Security. This technology […]
Featured Article
Long gone is the perceived image of the malware perpetrator as an outcast-teenager sitting in his parent’s basement. Today’s internet thieves are more organized and technically savvy than ever. Years ago, security threats were simpler. There were Trojans, worms, and rootkits – and the differences between each were clear.  Now known collectively as “malware”, the differences between these […]
Featured Article
As summer comes to a close, it’s time to get back to business. Fall brings a fresh opportunity to focus on what needs to be done and to make action plans for the last quarter of the year. This is especially relevant within the fast-paced and frequently evolving IT industry. New technologies are constantly being […]
Featured Article
Want to save time and money on your Windows 7 deployment? Virtualize!  If you’re a stalwart IT decision maker who stuck by Windows XP for the last decade, you’re finally coming face to face with the reality of a Windows 7 world. And you’re probably asking yourself: so how do I make the move? For […]
Featured Article
Editor’s note: our virtualization expert Stephen Akuffo weighs in on the Virtual Space Race Study blog series – see his notes below. Do you remember the days of dial up – when you had the patience to wait minutes for the information you wanted? Fast forward 20 years. We now live in an era that […]
Featured Article
It’s funny how things evolve so quickly. Just a few years ago, the thought of employees using their own phones or laptops for work at work was unthinkable. But as the consumerization of IT trend grows from a trickle to a flood, many organizations have no choice but consider how to implement a Bring Your […]
Featured Article
Just Google BYOD (as of July 16, that 6,340,000 results and counting) and BAM! it’s clear the bring-your-own-device revolution is far more than just a trend. If you’re CIO hasn’t started quivering yet – whether it be from excitement or fear – take a look at some more staggering numbers: 95% of organizations allow employee-owned […]
Featured Article
From the experts | December 16, 2011 by Stephen Perciballi
Social media is helping Softchoice CEO David MacDonald build relationships across the organization, and beyond its borders. Connecting with David MacDonald is as easy as sending him a tweet. MacDonald is part of the 18% of CEOs actively using social media. “As a company, we have humility in our culture that encourages us to be receptive […]
Featured Article
From the experts | August 10, 2011 by Stephen Perciballi
 The term “cloud” in IT today evokes many responses, feelings and ideas on its purpose, makeup, and overall value to an organization. Some believe “cloud” is exclusive to IT services fully residing in an externally owned and run data center, in which an organization rents resources through an on-demand model. Some people believe cloud to […]
Featured Article
Previously we gave a high level view of securing a virtual environment. We talked about security gaps in the post and one of the biggest gaps is the lack of visibility between virtual machines on the same server. In a physical world, you have a network based Firewall and possibly a Unified Threat Management device securing the […]
Featured Article
We’ve been thinking about cloud a lot.  My goal is to help demystify security in a virtual environment. What are we doing with cloud computing? There are still servers, storage, networking, software, and security.  We’re really just implementing them in different ways. Rather than having file servers at every location we are centralizing our data […]
Featured Article
Client Computing | November 15, 2010 by Stephen Perciballi
Okay, you don’t like seatbelts. Too confining, you say. You drive carefully, right? Or, you only use your car for short trips around the block. Of course, that all may sound pretty persuasive until you have an accident – and your arguments, among other things, fly out the window. Which brings me to the ongoing […]